• Title/Summary/Keyword: DoS attacks

Search Result 216, Processing Time 0.019 seconds

Security Threats Analysis for Network-based Mobile IPv6 (네트워크 기반 Mobile IPv6 보안 취약점 분석)

  • Kim, Hyun-Gon;Seo, Jae-Hyeon;Oh, Byeong-Kyun;Ahn, Tae-Nam;Kim, Jin-Hyung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.10
    • /
    • pp.137-147
    • /
    • 2007
  • In the host-based Mobile IPv6, a mobile node is responsible for doing the signaling to its home agent to enable session continuity as it moves between subnets. To remove the mobile node's signalling processing load, the network-based Mobile IPv6 has been proposed recently. It allows session continuity for a mobile node without its involvement in mobility management. The proxy mobility agent in the network performs the signaling and does the mobility management on behalf of the mobile node. However, to make secure communications for a mobile node, security mechanisms against diverse attacks should be adopted. To do this, first of all security threats to the network-based Mobile IPv6 should be also identified and analyzed. Potential attack objectives may be to consume network services at the cost of a legitimate mobile node and, eavesdropping and fabrication of user traffic through interception of a mobile node's communications. This paper identifies and discusses security threats to the network-based Mobile IPv6 in details. The results of threats analysis are limited to threats that are peculiar to the network-based Mobile IPv6 except threats to IPv6 in general.

A Case Report of Herpes Zoster Patient Improved by the East-west Medical Combined Treatment (대상포진에 대한 한양방 병행치료 치험 1례)

  • Cho, Ye Eun;Lee, Seung Min;Yoon, Kang Hyun;Lim, Ji Seok;Kim, Ji Hye;Choi, Do Young;Lee, Jae Dong
    • Journal of Acupuncture Research
    • /
    • v.31 no.1
    • /
    • pp.177-186
    • /
    • 2014
  • Objectives : The aim of this study is to report a case of a 51-year-old patient with Herpes zoster, whose symptoms were relieved within five weeks after the East-west medical combined treatment. Methods : A Herpes zoster patient with extreme pain around the right lower ribs and lower back was admitted into the Korean medicine hospital. Bee venom acupuncture was applied directly onto the site of pain and electroacupuncture was applied on $GV_6-BL_{20}$, inferior site of spinous process of the 12th thoracic vertebra-$BL_{21}$, $GV_5-BL_{22}$, $GV_4-BL_{23}$ six times a week. Moxibustion was applied on $BL_{49}$, $BL_{50}$, $BL_{51}$, $BL_{52}$, $GB_{25}$, $LR_{13}$ six times a week, and the patient took daily doses of herbal medicine and western medicines such as anticonvulsants, analgesics, antiepileptics. The patient's symptoms were evaluated with numeric rating scale(NRS) and neuropathic pain scale(NPS). Results : The results were as follows: 1. After the East-west medical combined treatment, the NRS grade decreased from 8 to 1. 2. On the neuropathic pain scale, the patient's symptoms changed from deep sharp pain and burning sensation to superficial dull pain and coldness. Sensitivity to touch, discomfort, and itchiness also decreased. Sudden attacks of pain appeared 14 to 21 days after onset, but disappeared after final treatment. Conclusions : The results of the above patient suggests that the East-west medical combined treatment may be effective for total remission of herpes zoster. Further research is needed to confirm such effects.

The Work of Mourning of 9/11 in U. S. A (미국의 9/11 애도 작업에 관한 고찰 : 9/11추모관 건립과 테러와의 전쟁을 중심으로)

  • OH, bonghee
    • Cross-Cultural Studies
    • /
    • v.38
    • /
    • pp.89-113
    • /
    • 2015
  • This paper explores the work of mourning of 9/11 in the United States, focusing on the project of building the National September 11 Memorial managed by the Lower Manhattan Development Corporation(LMDC) and the War on Terror declared by the George W. Bush administration in the wake of 9/11. This paper first looks at the project of building the Natioanl September 11 Memorial and considers what was at stake in achieving this project. It also examines the limitations of the project. This paper argues that, in spite of the efforts to mourn the victims in significant and meaningful ways, the work of mourning in the memorial project fails at least in two respects. First, the memorial project "began so soon" right after 9/11 that the victims' families were not given enough time to mourn their loved ones. Second, the project were permeated with American nationalism and patriotism, which made the 316 non-American victims of 9/11 invisible and forgotten. Then, it goes on to examine the War on Terror because the War on Terror epitomized the failure of mourning due to these causes. In his address to the nation delivered on the very day of 9/11, President George W. Bush stated that "America was targeted for the attack because we're the brightest beacon for freedom and opportunity in the world" and that the terrorists failed to threaten America into chaos. He also stated that America is in "the war against terrorism." These statements were a futile reassertion of the illusion of American invulnerability and a prohibition of mourning in favor of violent military responses to 9/11. American nationalism also underlies Bush's official naming of September 11 as "Patriot Day." The victims were sacrificed because they were at the site when terrorists attacked, which implies that their death had nothing to do with American patriotism. Naming September 11 as Patriot Day was an act of imbuing the absurdity of the victims' death with a false meaning and an act of forgetting the non-American victims. The failure of the work of mourning of 9/11 consisted in the inability to recognize human vulnerability and interdependence and the inability to mourn not only American victims but also non-American victims killed in 9/11 and the War on Terror. A meaningful and significant mourning could be possible when we realizes that all human beings are exposed to one another and their lives are interdependent on one another. September Eleventh Families for Peaceful Tomorrows well demonstrated this kind of mourning. When most Americans supported violent retaliations, Peaceful Tomorrows made pleas for nonviolent responses to 9/11. Turning their grief into action for peace, its members work "to create a safer and more peaceful world for everyone," not only for Americans. Their effort to mourn in meaningful and nonviolent ways delivers the message that a disaster like 9/11 should not happen anywhere.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Adaptive Partitioning of the Global Key Pool Method using Fuzzy Logic for Resilience in Statistical En-Route Filtering (통계적 여과기법에서 훼손 허용도를 위한 퍼지 로직을 사용한 적응형 전역 키 풀 분할 기법)

  • Kim, Sang-Ryul;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.16 no.4
    • /
    • pp.57-65
    • /
    • 2007
  • In many sensor network applications, sensor nodes are deployed in open environments, and hence are vulnerable to physical attacks, potentially compromising the node's cryptographic keys. False sensing report can be injected through compromised nodes, which can lead to not only false alarms but also the depletion of limited energy resource in battery powered networks. Fan Ye et al. proposed that statistical en-route filtering scheme(SEF) can do verify the false report during the forwarding process. In this scheme, the choice of a partition value represents a trade off between resilience and energy where the partition value is the total number of partitions which global key pool is divided. If every partition are compromised by an adversary, SEF disables the filtering capability. Also, when an adversary has compromised a very small portion of keys in every partition, the remaining uncompromised keys which take a large portion of the total cannot be used to filter false reports. We propose a fuzzy-based adaptive partitioning method in which a global key pool is adaptively divided into multiple partitions by a fuzzy rule-based system. The fuzzy logic determines a partition value by considering the number of compromised partitions, the energy and density of all nodes. The fuzzy based partition value can conserve energy, while it provides sufficient resilience.

  • PDF

A novel power trace aligning method for power analysis attacks in mobile devices (모바일 기기에서의 전력 분석 공격을 위한 새로운 전력 신호 정렬 방법)

  • Lee, Yu-Ri;Kim, Wan-Jin;Lee, Young-Jun;Kim, Hyoung-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.153-166
    • /
    • 2011
  • Recent trends in mobile device market whose services are rapidly expanding to provide wireless internet access are drawing people's attention to mobile security. Especially, since threats to information leakage are reaching to the critical level due to the frequent interchange of important data such as personal and financial information through wireless internet, various encryption algorithms has been developed to protect them. The encryption algorithms confront the serious threats by the appearance of side channel attack (SCA) which uses the physical leakage information such as timing, and power consumption, though the their robustness to threats is theoretically verified. Against the threats of SCA, researches including the performance and development direction of SCA should precede. Among tile SCA methods, the power analysis (PA) attack overcome this misalignment problem. The conventional methods require large computational power and they do not effectively deal with the delay changes in a power trace. To overcome the limitation of the conventional methods, we proposed a novel alignment method using peak matching. By computer simulations, we show the advantages of the proposed method compared to the conventional alignment methods.